Re: [Doh] [DNSOP] New I-D: draft-reid-doh-operator

"Martin Thomson" <mt@lowentropy.net> Tue, 19 March 2019 20:33 UTC

Return-Path: <mt@lowentropy.net>
X-Original-To: doh@ietfa.amsl.com
Delivered-To: doh@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4FBCB12867B for <doh@ietfa.amsl.com>; Tue, 19 Mar 2019 13:33:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.701
X-Spam-Level:
X-Spam-Status: No, score=-2.701 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=lowentropy.net header.b=ENB5vM5J; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=RVmkQ6i6
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xKZxAnJvLIHI for <doh@ietfa.amsl.com>; Tue, 19 Mar 2019 13:33:28 -0700 (PDT)
Received: from out2-smtp.messagingengine.com (out2-smtp.messagingengine.com [66.111.4.26]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7BC911277CD for <doh@ietf.org>; Tue, 19 Mar 2019 13:33:28 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.nyi.internal (Postfix) with ESMTP id 99A092200A for <doh@ietf.org>; Tue, 19 Mar 2019 16:33:27 -0400 (EDT)
Received: from imap2 ([10.202.2.52]) by compute1.internal (MEProxy); Tue, 19 Mar 2019 16:33:27 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=lowentropy.net; h=mime-version:message-id:in-reply-to:references:date:from:to :subject:content-type; s=fm1; bh=QMkFeNjDxN9I9aHGPTeEKWmy/24esqz Nc5VURpba25o=; b=ENB5vM5JcBqbL2lLg8AEwNpQl6+fwQpkNbPbPeBJaJ4yZQM FQcjpJUx+7SMJ4FigeJjKjAyrwI5ZCN9R3+XrLsE2x6BRhMK/CCwqjQQFpNJKgAK GcysX6EtDs7UGNFKOKUTstbhbotJlbTKhDagqTARCU+RMbjStDqHLQ+bUB2pvs9f BPz83SnTUKgjj8ZoDcFFpSsrUVHWltPKx+5IqIfRW2IVOix3LkN4g5hxDKRFltNC mQeNqxab2uhz5IQbQmoXPh1truCtdgFAJZF5TwFw27vuR0tz3AxyhmQNOIEjJOo8 X9CLWnKmLtEKFVLcd0fDbGiXAVfjBP/P3GKZ0uA==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=QMkFeN jDxN9I9aHGPTeEKWmy/24esqzNc5VURpba25o=; b=RVmkQ6i6RSaW+KespRRhwn j5GGAX/H9Ar0SlE0xeRDhjLt5rTMRuLhHZB8gbcO9yQvm2xFyoqD0Vdwr23mX4+e /YMEaK46EaLpfi8xCCqnM5QxxyCzB4/k0BqZ7k61j6FU9dPx0k2pnZQcOD4lfAF8 SDt3ebhyNol6ozTYPfBBe+SnHW+xEv8STfxgoFZYNAeDPJ1KWQFM5g1LIP8lBlAE 22GrrNPhJqxaKwsRGcJuPckFaFKMJjhSKDvIsvGFHssN/prSExpqq9vPZuiBdnoK JgNsl2YVGF9pdh6SpFAqHOaRNhGjnMIkqkgWmIOC6mo6ZRmBTrn6+XvtxM2AnD3Q ==
X-ME-Sender: <xms:F1KRXFoInAGy4-V2QvR6jMFcRR8clQe8oEHpXAk02-zDHFkXUcCfUA>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgedutddrieeggddugeduucetufdoteggodetrfdotf fvucfrrhhofhhilhgvmecuhfgrshhtofgrihhlpdfqfgfvpdfurfetoffkrfgpnffqhgen uceurghilhhouhhtmecufedttdenucenucfjughrpefofgggkfgjfhffhffvufgtsehttd ertderredtnecuhfhrohhmpedfofgrrhhtihhnucfvhhhomhhsohhnfdcuoehmtheslhho figvnhhtrhhophihrdhnvghtqeenucfrrghrrghmpehmrghilhhfrhhomhepmhhtsehloh ifvghnthhrohhphidrnhgvthenucevlhhushhtvghrufhiiigvpedt
X-ME-Proxy: <xmx:F1KRXCSaaB9ODKSCjJOa4eQPNKEDbMSviWWMKn_K7nCXjo8PFnEVww> <xmx:F1KRXIOv17y8ZM-COtwTjUoxbwwXfXRQCG5iJKY8PGevdC2Zjm7LGA> <xmx:F1KRXAhpUF8DD4V7lSeLpCM1Kdy-roFRpx2WQFOHs7ZjSoiw-fVoSg> <xmx:F1KRXOtRzRow_EGmwrGxJjK7Qdoj3R9SRHBTfaunuEHm4oLdX8wbmw>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 13CF57C651; Tue, 19 Mar 2019 16:33:27 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.1.5-976-g376b1f3-fmstable-20190314v3
Mime-Version: 1.0
X-Me-Personality: 92534000
Message-Id: <b5f4a266-b6ef-463b-9ecd-8964ca3d20a2@www.fastmail.com>
In-Reply-To: <CA+9kkMBXgPHmLRV44Qen_xm1G+Xerb5WJ0JvL11U3XayVgTHfA@mail.gmail.com>
References: <155218771419.28706.1428072426137578566.idtracker@ietfa.amsl.com> <1914607.BasjITR8KA@linux-9daj> <CA+9kkMAYR19CCCLN00A5Oy_=9Z97FQogCz-vdC=M7Ffn47fTgQ@mail.gmail.com> <1900056.F7IrilhNgi@linux-9daj> <CA+9kkMCgmzjbPM+DTUYuS3OsT+wOCmsyaGPg6fPu=w-ibL=NrA@mail.gmail.com> <CAAiTEH_umx5Xqa24TywQ_BX_Lpo6piwRWPLWhADkh-PnM20vcg@mail.gmail.com> <CA+9kkMBXgPHmLRV44Qen_xm1G+Xerb5WJ0JvL11U3XayVgTHfA@mail.gmail.com>
Date: Tue, 19 Mar 2019 16:33:28 -0400
From: Martin Thomson <mt@lowentropy.net>
To: doh@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/doh/xKDOGbhxIZwwp_3TEqyFcRB4FZg>
Subject: Re: [Doh] [DNSOP] New I-D: draft-reid-doh-operator
X-BeenThere: doh@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: DNS Over HTTPS <doh.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/doh>, <mailto:doh-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/doh/>
List-Post: <mailto:doh@ietf.org>
List-Help: <mailto:doh-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/doh>, <mailto:doh-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Mar 2019 20:33:30 -0000

I agree with Ted.

On Wed, Mar 20, 2019, at 04:46, Ted Hardie wrote:
> My apologies if I have misunderstood your point 
> here, but unless you also block all traffic for which you have seen no 
> resolution event, I believe that it is entirely possible to circumvent 
> the defense you describe.

The problem with blocking packets that can't be traced to a resolution event is that you need to catch all the resolution events. DNS doesn't have a monopoly on address resolution - I mean, that's the whole point of this discussion, isn't it?

Yes, there are a great many protocols that include a DNS query before every communication attempt, but not all.  If you are comfortable breaking or degrading all the other protocols, this is I guess an OK strategy.  I personally wouldn't call the thing that you get out the other end "Internet".  Of course, people routinely make that claim with only TCP ports 80 and 443 open.

> browsers treated all downloaded 
> JavaScript applications as potentially malign. 

Nicely understated.  Spend any amount of time on this problem and the word "potentially" just fades away.